h8mail
h8mail is an email OSINT and breach hunting tool using different breach and reconnaissance services.
Details
Category: Social Engineering
Publisher: trickest
Created Date: 6/23/2021
Container: quay.io/trickest/h8mail:v2.5.6
Source URL: https://github.com/khast3x/h8mail
Parameters
Command:
-k
- Pass config options. Supported format: K=V,K=VCommand:
-ch
- Add related emails from hunter.io to ongoing target list. Define number of emails per target to chase. Requires hunter.io private API key if used without power-chaseCommand:
--debug
- Print request debug informationCommand:
-gz
- Local tar.gz (gzip) compressed breaches to scans for targetsCommand:
-u
- String URL input. (Require http:// or https://)Command:
-bc
- Path to the breachcompilation torrent folder. Uses the query.sh script included in the torrentCommand:
-q
- Perform a custom query. Supports username, password, ip, hash, domain. Performs an implicit loose search when searching locallyCommand:
-c
- Configuration file for API keys. Accepts keys from Snusbase, WeLeakInfo, Leak-Lookup, HaveIBeenPwned, Emailrep, Dehashed, and hunterCommand:
--power-chase
- Add related emails from ALL API services to ongoing target list. Use with chaseCommand:
-sf
- If breach contains big cleartext or tar.gz files, set this flag to view the progress bar. Disables concurrent file searching for stabilityCommand:
-lb
- Local cleartext breaches to scan for targets.Command:
--loose
- Allow loose search by disabling email pattern recognition.Command:
-t
- String target inputCommand:
-sk
- Skips HaveIBeenPwned and HunterIO checkCommand:
--hide
- Only shows the first 4 characters of found passwords to output.Command:
-u
- File URL inputCommand:
-t
- File target input